First published: Mon Nov 07 2022(Updated: )
The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-dates package. The affected version of d8s-htm is 0.1.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Democritus D8s-timer | =0.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43306 refers to a vulnerability in the d8s-timer package for Python, where a potential code-execution backdoor was inserted by a third party.
CVE-2022-43306 has a severity keyword of 'high' and a severity value of 8.8 out of 10.
The affected software is the Democritus D8s-timer version 0.1.0 for Python.
To fix CVE-2022-43306, you should update the d8s-timer package to a version that does not contain the code-execution backdoor.
You can check the following references for more information about CVE-2022-43306: [GitHub issue #11](https://github.com/dadadadada111/info/issues/11), [PyPI d8s-timer](https://pypi.org/project/d8s-timer/), [PyPI democritus-dates](https://pypi.org/project/democritus-dates/).